TECHNICAL FIELD
[0001] The present invention relates to a copy management system which performs copy management
of a computer program such as game content, movie content, music content, or an application
program; computer-readable storage media stored with a client terminal device information
processing program; computer-readable storage media stored with a management server
device information processing program; a client terminal device information processing
program; a management server device information processing program; and a copy management
method thereof.
BACKGROUND ART
[0002] These days, video game machines playing video games based on game content stored
on a storage media such as a CD-ROM, DVD-ROM, or semiconductor memory have become
widely popularized.
[0003] A user purchases a storage media stored with desired game content and plays a video
game by reproducing such storage media with a video game machine. In most cases, the
user gradually begins to collect new video games. As time passes, this results in
the user accumulating storage media stored with each game content.
[0004] However, in many cases, a video game machine is only provided with only one storage
media reproducing mechanism. Therefore, in order to play a different video game, the
storage media currently loaded in the video game unit must be removed, and the storage
media stored with the game content to be played is loaded, which is a bothersome task.
[0005] The applicant discloses a video game machine that is capable of incorporating an
internally mounted or externally attached high-capacity, for example, in the order
of tens of gigabyte, hard disk drive (HDD).
[0006] In the case of such a video game machine, the game content stored in each storage
media are respectively copied to the HDD and it is possible to reproduce and use the
desired game content from this HDD. By using such a HDD, it is possible to eliminate
the bother of loading the memory medium from the reproducing mechanism of the video
game machine.
[0007] A computer program such as game content should only be usable by a user who has properly
acquired software (storage media) stored with that computer program, such as by purchasing
it.
[0008] However, in cases where a computer program stored on a storage media is made copyable
onto a secondary storage media, the computer program stored on a single storage media
may be copied by a plurality of users onto a respective secondary media and used,
raising fears of unauthorized copies.
[0009] The object of the present invention is to provide a copy management system, which
aims to prevent unauthorized use of content by performing copy management that allows
copy of a computer program only by an authorized user; computer-readable storage media
stored with a client terminal device information processing program; computer-readable
storage media stored with a management server device information processing program;
a client terminal device information processing program; a management server device
information processing program; and a copy management method thereof.
DISCLOSURE OF THE INVENTION
[0010] According to the present invention, a storage media stored with content encrypted
with an encryption key is attached with a unique identification number and distributed
to a user. An identification number is also attached to the device used when the user
copies the content.
[0011] The above-mentioned device transmits the identification number of the above-mentioned
storage media and the device ID to a management server device. The management server
device comprises a database, which registers the identification number of the device
used by each user. The management server device identifies the user by referencing
the identification number of the device registered in the database and the identification
number of the device transmitted from the user device. The management server device
transmits a decryption key for decrypting content stored in the storage media to the
user device when the user has been identified through this referencing.
[0012] The user device decrypts the content stored in the storage media in accordance with
the decryption key distributed from the administrator side and copies the content.
[0013] Accordingly, it is possible to allow content copying by an authorized user who is
the owner of the storage media, and it is possible to prevent unauthorized copy of
the content.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014]
FIG. 1 is a block diagram showing system configuration of a copy management system
of a first embodiment of the present invention;
FIG. 2 is a perspective view showing the external appearance of a client terminal
device and a hard disk drive (HDD) configuring a copy management system;
FIG. 3 is a block diagram showing an electrical configuration of a client terminal
device;
FIG. 4 is a diagram for describing an optical disk stored with contents encrypted
with a Content-Key and utilized in such copy management system;
FIG. 5 is a flowchart illustrating the flow of user registration in a copy management
system;
FIG. 6 is a schematic view of a copy management system showing each piece of information
sent/received between a client terminal device and a system server device during user
registration;
FIG. 7 is a flowchart illustrating registration of a Media Unique ID (MID) included
separately in an optical disk and acquisition of a Content-Key in a copy management
system;
FIG. 8 is a schematic diagram of a copy management system showing each piece of information
sent/received between a client terminal device and a system server device during registration
of an MID included separately in an optical disk and acquisition of a Content-Key;
FIG. 9 is a flowchart illustrating the flow during copying in the copy management
system;
FIG. 10 is a schematic diagram showing each piece of information sent/received between
a client terminal device, a memory card, and an HDD during copying;
FIG. 11 is a flowchart illustrating the reproducing operation for contents copied
to the HDD in a copy management system;
FIG. 12 is a schematic diagram showing information sent/received between a client
terminal device, a memory card, and an HDD during reproducing of contents copied to
an HDD;
FIG. 13 is a schematic diagram for describing how a copy management system copes with
repair or replacement of a client terminal device or HDD;
FIG. 14 is a schematic diagram for describing how a copy management system copes with
damage or loss of a memory card; and
FIG. 15 is a schematic diagram of a copy management system according to the second
embodiment of the present invention showing each piece of information sent/received
between a client terminal device and a system server device during registration of
an MID included separately in an optical disk and acquisition of a Content-Key.
BEST MODE FOR CARRYING OUT THE INVENTION
[0015] The present invention can be applied to a copy management system, which performs
copy management of a computer program.
[0016] A computer program may include, for example, game content, music content, movie content,
or an application program. A storage media recorded with a computer program may include
semiconductor memory as well as an optical disk such as a DVD-ROM or CD-ROM. Secondary
storage media upon which a copy of a computer program is stored may include, for example,
a hard disk (HD), DVD-RAM, and a magneto-optical disk (MO).
[0017] In the following, "content" will collectively refer to the above-mentioned game content,
music content, movie content, or an application program.
Overall Structure of Copy Management System
[0018] To begin with, FIG. 1 shows the overall structure of a copy management system of
the first embodiment of the present invention. As shown in FIG. 1, the copy management
system of this first embodiment includes a client terminal device
1, which comprises a function of reproducing (executing function) content stored in
an optical disk and a function of network communications.
[0019] A hard disk drive
2 for copying content stored in an optical disk is connected to this client terminal
device
1.
[0020] In addition, a communications modem
6 for connecting to a network such as the Internet
5 is connected to this client terminal device
1.
[0021] It is noted that the communications modem
6 may be provided in an externally attached configuration with the client terminal
device
1 as shown in FIG. 1. Alternatively, the communications modem
6 may be provided internally mounted within the client terminal device
1.
[0022] In addition, the copy management system may include a system server device
4 comprising a database
3, which is stored with user entry information. The copy management system is configured
by connecting this system server device
4 and the client terminal device
1 mentioned above to each other via a network such as the Internet
5.
Configuration of Client Terminal Device
[0023] FIG. 2 shows a perspective view of the external appearance of the client terminal
device
1. As shown in FIG. 2, controller connectors
7A and
7B, and memory card loaders
8A and
8B are disposed on the front side of the client terminal device
1.
[0024] In addition, two universal serial bus (USB) terminals
9, for connection to USB compatible equipment, and an IEEE 1394 terminal
10, which is compatible with a possible data transmission rate of, for example, up to
400 Mbps, are disposed on the front of this client terminal device
1.
[0025] In addition, a tray-shaped disk loader
11, for loading an optical disk, may be disposed on the front side of the client terminal
device
1.
[0026] In addition, a reset button
12 for causing the executing or reproducing of content to reset and a tray operating
button
13 for operating insertion/ejection of the tray of the optical disk loader
11 are disposed on the front side of the client terminal device
1.
[0027] A power switch, an audio/video output terminal (AV multi output terminal), a PC card
slot, a digital optical output terminal, and an AC power input terminal, etc. are
disposed on the back panel of the client terminal device
1.
[0028] The AV multi output terminal is connected to television receiver
18, which is used as a monitor, via AV cable
17. The video signal and audio signal output from the client terminal device
1 is supplied to a television receiver
18, which is used as a monitor, via this AV multi output terminal and an AV cable
17. This allows the video of the above-mentioned content to be displayed on the television
receiver
18. In addition, the audio of the above-mentioned content is emitted through the speaker
device of the television receiver
18.
[0029] Controller connectors
7A and
7B are respectively connected to a controller
14 via a controller cable
15.
[0030] Memory cards for saving, which perform saving (storing) and readout of game data
are loaded into the memory card loaders
8A and
8B.
Configuration of Hard Disk Drive
[0031] Next, the casing placed on the top surface of client terminal device
1 in FIG. 2 is the hard disk drive
2 (hereafter referred to as HDD
2). This HDD
2 is provided with an internal high-capacity, for example 40 GB, hard disk. Game content
equivalent to that stored on tens of DVD-ROMs can be copied onto this HDD
2.
[0032] A power lamp
20, which is illuminated when the power is on, and writing indicator lamp
21, which is illuminated when the hard disk is engaged in writing, are disposed on the
front panel of HDD
2. On the back panel of HDD
2, there is disposed at least a power switch and a data input/output terminal.
[0033] In the case where the HDD
2 is connected to the client terminal device
1, a PC card is inserted into the above-mentioned PC card slot disposed on the back
panel of client terminal device
1. While in this state, one end of a connector cable is connected to the PC card. The
other end of the connector cable is connected to the data input/output terminal of
HDD
2. As a result, client terminal device
1 and HDD
2 are electrically connected to each other.
[0034] It is noted that in this example, HDD
2 is in a separate unit from client terminal device
1, and is externally attached to client terminal device
1. Alternatively, this HDD
2 may be provided internally mounted in client terminal device
1.
[0035] In addition, client terminal device
1 and HDD
2 are connected to each other via a PC card and a connector cable. Alternatively, a
USB connection terminal or an IEEE 1394 connection terminal may be disposed on the
back panel (or even on the front panel) of the HDD
2, and the HDD
2 and the client terminal device
1 may be connected via either of these connection terminals.
Electrical Configuration of Client Terminal Device
[0036] FIG. 3 is a block diagram of client terminal device
1. As shown in FIG. 3, the client terminal device
1 comprises a CPU
30, a graphics processor
31, and an IO processor (IOP)
32.
[0037] In addition, client terminal device
1 comprises an optical disk controller
33, which controls reproducing of an optical disk such as a CD-ROM or a DVD-ROM, and
a sound processor unit (SPU)
34.
[0038] In addition, client terminal device
1 comprises a MASK-ROM
35, which is stored with an operating system program that the CPU
30 and the IOP
32 execute, and a RAM
36, which functions as a buffer that is temporarily stores the data read out from the
work area of the CPU
30 or an optical disk.
[0039] In addition, the client terminal device
1 comprises a CD/DVD DSP
38, which employs error correction processing (CRC processing) on reproducing output
from an optical disk that is supplied via a RF amplifier
37 of the optical disk controller
33, and outputs it.
[0040] In addition, client terminal device
1 comprises a driver
39 and a mechanical controller
40, which, for example, control such as the rotation of a spindle motor in the optical
disk controller
33, control optical pickup focus and tracking, and control disk tray loading.
[0041] In addition, client terminal device
1 comprises card-shaped connector
41 to which the above-mentioned PC card is connected.
[0042] These components is connected to each other mainly by bus lines
42 and
43.
[0043] It is noted that reproducing of video content stored in a DVD-ROM is performed based
on DVD driver software stored in a memory card. Alternatively, reproducing of video
content may be performed based on DVD driver software burned into semiconductor memory
44 (DVD player ROM) internally mounted within the client terminal device
1.
[0044] The operating system program is stored in the MASK-ROM
35. The CPU
30 performs overall control of the client terminal device
1 based on the operating system program stored in this MASK-ROM
35.
[0045] Hardware identification numbers (hardware IDs) of the controller
14, a memory card
16, and the HDD
2, which are connected to the controller connectors
7A and
7B, the memory card loaders
8A and
8B, and the card-shaped connector
41, are stored in the MASK-ROM
35. The IOP
32 communicates with hardware such as the controller
14, the memory card
16, and the HDD
2 based on the hardware IDs stored in this MASK-ROM
35, and identifies the hardware connected to, for example, each of connection terminals
7A, 7B,
8A, and
8B, and card-shaped connector
41 and recognizes it.
[0046] It is noted that a hardware ID means an ID generically attached to each piece of
hardware, in a manner such as one overall ID for the client terminal device
1, one ID for the memory card
16, and one ID for the HDD
2.
[0047] On the other hand, the Client ID, MC-ID and HDD-ID described below are hardware-specific
IDs attached to each client terminal device
1, each memory card
16, and each HDD
2, respectively.
[0048] The GPU
31 performs rendering in accordance with render directions from the CPU
30, and stores the image rendered in a frame buffer not shown in the Figures. In addition,
GPU
31 has a function of being used as a geometric transfer engine for performing processing
such as coordinate transformation.
[0049] In the case where, for example, game content stored in a optical disk utilizes "3-D
graphics", this GPU
31 generates a virtual 3-D object with the aggregation of triangle-shaped polygons.
The GPU
31 then performs various calculations so as to generate an image obtained by capturing
the 3-D object with a virtual camera. More specifically, GPU
31 performs, for example, perspective projection (calculation of coordinates when the
apexes of each polygon configuring a three-dimensional object are projected on a virtual
screen), so as to perform rendering.
[0050] In addition, the GPU
31 performs rendering into a frame buffer while utilizing the geometry transfer engine
as needed in accordance with rendering instructions from the CPU
30. The video signal corresponding to this rendered image is then output (visual out).
[0051] Meanwhile, the SPU
34 comprises functions such as an adaptive differential pulse code modulation (ADPCM)
decoding function, which reproduces audio data that has been subjected to adaptive
prediction coding; a reproducing function, which reproduces and outputs (audio out)
an audio signal such as effective sound by reproducing waveform data stored in a sound
buffer; and a modulation function, which modulates and reproduces waveform data stored
in a sound buffer. This SPU
34 operates as a so-called sampling sound generator. The SPU
34 generates an audio signal such as musical sound and effective sound based on waveform
data stored in the sound buffer in conformity with instruction from the CPU
30.
[0052] With this sort of client terminal device
1, once the power has been turned on, the CPU
30 and the IOP
32 begin reading an operating system program for the CPU
30 and an operating system program for the IOP
32, respectively, from the MASK-ROM
35.
[0053] The CPU
30 centrally controls each component of the client terminal device
1 in conformity with the operating system program for the CPU30.
[0054] IOP
32 controls input and output of data among, for example, the controller
14, the memory card
16, and the HDD
2 in conformity with the operating system program for IOP
32.
[0055] After performing initialization processing such as a performance check, the CPU
30 controls the optical disk controller
33 to perform reproducing control of content stored in an optical disk based on the
operating system program for CPU
30.
[0056] In the case where the content played back is the game content of a video game, the
CPU
30 directs the GPU
31 and the SPU
34 to control display of images from the game content and sound production of, for example,
effective sound and musical sound based on instructions (commands) from a player that
are received from the controller
14 via the IOP
32.
[0057] In the case where the content played back is movie content, the CPU
30 directs the GPU
31 and the SPU
34 to control display of video from the movie content and sound production based on
instructions from a player that are received from the controller
14 via the IOP
32.
Copy Management Operation
[0058] In a situation where content stored in an optical disk is to be copied to the HDD
2, the copy management system performs management in the following manner.
Installation of Installer
[0059] To begin with, in order to copy content stored in an optical disk to the HDD
2 with this copy management system, a copy controlling application program (installer)
needs to be executed at client terminal device
1. In the case of this example, the installer is stored in the optical disk together
with the content. The client terminal device
1 installs the installer before copying the content.
[0060] In the case of installing an installer, the user inserts the optical disk stored
with the installer in the client terminal device
1. The CPU
30 in the client terminal device
1 reads out, automatically upon insertion of an optical disk (auto run), or in accordance
with operation of the controller
14 by the user, the installer stored in the optical disk, and stores this in the memory
card
16 or the RAM
36.
[0061] In the situation where the user has instructed the content stored in the optical
disk to be copied, CPU
30 executes the installer stored in the memory card
16 or the RAM
36. The CPU
30 controls the copying of the content by executing this installer.
[0062] It is noted that an optical disk stored with the installer only may be manufactured
by the system manufacturer side and distributed to users. Alternatively, a memory
card stored with the installer may be manufactured by a system manufacturer side and
distributed to users. In this case, it is possible that the installation procedure
for the installer may be abbreviated. Otherwise, a ROM stored with the installer may
be provided within the client terminal device
1. In this case also, it is possible that the installation procedure for the installer
may be abbreviated.
Content Encryption
[0063] As shown in FIG. 4, encryption processing is employed on content stored in a optical
disk using a symmetric key that differs for each content (Content-Key). In addition,
besides such encryption-processed content, the optical disk may also be stored with
a "Media unique ID (MID)" that is peculiar to each individual disk.
User Registration
[0064] Next, with the copy management system of this first embodiment, in the case where
content is copied from an optical disk to the HDD
2, user registration is performed in system server device
4 using the "memory card ID (MC-ID)" uniquely attached to each memory card 16. When
this user registration has not been performed, content copy is not authorized.
[0065] FIG. 5 is a flowchart showing the flow up to when a user performs user registration
in system server device
4. FIG. 6 is a schematic view of the copy management system showing each piece of information
sent/received between the client terminal device
1 and the system server device
4 through this user registration.
[0066] A user registration procedure is described forthwith using the FIG. 5 and FIG. 6.
The flowchart in FIG. 5 starts with the user turning on the main power of the client
terminal device
1.
[0067] In Step S1, a user connects his/her client terminal device
1 to the system server device
4 via the Internet
5.
[0068] More specifically, the Internet-connecting communications modem
6 is connected to (or internally mounted in) the client terminal device
1 as shown in FIG. 1. Once the user has designated Internet connection, the CPU
30, which is shown in FIG. 3, operates based on a predetermined world wide web browser,
and establishes a communication link between the client terminal device
1 and the system server device
4 via this communications modem
6. This allows the user registration procedure to proceed to Step S2.
[0069] In Step S2, the CPU
30 transmits the identification number of the memory card loaded into client terminal
device
1 (MC-ID), the identification number uniquely attached to each client terminal device
1 (Client ID), and the identification number uniquely attached to each HDD
2 (HDD-ID) to the system server device
4.
[0070] More specifically, once a communication link has been established between the system
server device
4 and the client terminal device
1, the CPU 30 communicates, respectively, with the client terminal device
1, the HDD
2, and the memory card
16. Through this communication, the CPU
30 obtains, respectively, the identification number uniquely attached to the client
terminal device
1 (Client ID), the identification number uniquely attached to the HDD
2 (HDD-ID), and the identification number uniquely attached to the memory card
16 (MC-ID), which is loaded in the client terminal device
1. The CPU
30 transmits these identification numbers to the system server device
4 side as shown in FIG. 6. With this, the user registration procedure proceeds to Step
S3.
[0071] It is noted that data transmitted/received between client terminal device
1 and system server device
4 is encrypted based on a communication protocol such as Secure Sockets Layer (SSL)
to maintain secure communications.
[0072] In addition, in this example, the CPU
30 obtains the Client ID, the HDD-ID and the MC-ID by communicating with each device
and transmits them to the system server device
4 side. However, the Client ID, the HDD-ID, and the MC-ID are labeled on each of the
respective casings of the client terminal device
1, the HDD
2, and the memory card
16 in a manner allowing them to be visible to the user. As a result, the user may look
at the Client ID, the HDD-ID and the MC-ID, manipulate the controller
14 to manually input each ID, and transmits it to the system server device
4 side.
[0073] Next, in Step S3, the system server device
4 determines whether the identification number of the memory card (MC-ID) transmitted
from the user is a valid ID. In this Step S3, if the system server device
4 determines that the MC-ID transmitted by the user is a valid ID, the user registration
procedure proceeds to Step S4; if it determines that the MC-ID transmitted by the
user is an invalid ID, the user registration procedure proceeds to Step S7.
[0074] More specifically, the system server device
4 comprises a database
3, in which the Client IDs for all client terminal devices
1, the HDD-IDs for all HDDs
2, and the MC-IDs for all memory cards
16 are stored.
[0075] Upon transmission of each unique ID for the client terminal device
1, the HDD
2, and the memory card
16 from the user, the system server device 4 first compares the MC-ID transmitted from
the user as the unique ID of the memory card
16, with each MC-ID registered in the database
3, and determines whether the same MC-ID as the MC-ID of the memory card
16 transmitted from the user is registered in the database
3.
[0076] Namely, the system server device
4 determines whether the MC-ID of the memory card
16 transmitted from the user is the same as an MC-ID duly registered in database
3.
[0077] In the case where the MC-ID of the memory card
16 that was transmitted from the user does not match any of the MC-IDs duly registered
in the database
3, the system server device
4 determines that this user registration access is an unauthorized user registration
access. In this case, in Step S7, system server device
4 responds by transmitting a message rejecting the user registration such as "USER
REGISTRATION CANNOT BE COMPLETED WITH THIS MEMORY CARD" (notice of invalidity) to
the client terminal device
1 side. With this, the user registration is terminated discontinuing the user registration
procedure.
[0078] On the other hand, in the case where the MC-ID of the memory card
16 transmitted from the user matches one of the MC-IDs duly registered in database
3, in Step S4, the system server device
4 forms a User ID, which is an ID unique to the user currently accessing the system
server device
4, for example using random numbers.
[0079] The System server device
4 then, as shown in FIG. 6, bundles the Client ID, the HDD-ID, and the MC-ID of the
user together with the User ID, which is the ID unique to the user described above,
and an MC-Key, which is described later, and registers this as "USER ENTRY INFORMATION"
in database
3 of the system server device
4.
[0080] In this manner, the copy management system of this embodiment identifies and registers
in database
3 each user with a combination of the three IDs of each user's client terminal device
1, HDD
2, and memory card
16.
[0081] Since it is impossible for the three IDs of the client terminal device
1, the HDD
2, and the memory card
16 to completely match up between different users, the user identification and the user
registration can be reliably performed by performing user registration based on these
three IDs. As a result, it is possible to provide stronger prevention against unauthorized
copies of content stored in an optical disk described below.
[0082] It is noted here that it is also possible for user registration to take place through
the transmission of "only the MC-ID", "only the Client ID", "only the HDD-ID", "the
MC-ID and Client ID", "the MC-ID and HDD-ID", or "the Client ID and HDD-ID" to the
system server device
4 side. In these cases as well, user identifications and user registrations can be
reliably performed without overlapping among different users since each ID is a respectively
unique ID.
[0083] Next, as the user registration procedure proceeds to Step S5, as a sign that the
user registration has been duly completed, system server device
4 encrypts the User ID within the user entry information formed in the above-mentioned
Step S4 with the MC-Key and returns it to the client terminal device
1 side.
MC-Key
[0084] The above-mentioned "MC-Key" is key information for encrypting data transmitted/received
between the client terminal device
1 and the system server device
4. This MC-Key is pre-stored within the memory card
16 together with the MC-ID.
[0085] The MC-ID is labeled on the casing of memory card
16 in a manner allowing it to be visible to the user; however, this MC-Key is stored
inside the memory card
16 so as to not be visible to the user. In addition, this MC-Key is made to be highly
confidential information so that there is no chance of it being displayed or output
even in cases where the user reproduces information stored in the memory card
16. Therefore, this MC-Key is made unrecognizable at user level.
[0086] In addition, the MC-Keys stored in each of the respective memory cards
16, together with the MC-IDs of all of the memory cards
16 are stored in the database
3 of the system server device
4. When the MC-Key is needed, the system server device
4 reads out the MC-Key from this database
3 and makes a reference to it. Therefore, the MC-Key never be transmitted from the
client terminal device
1 to the system server device
4.
[0087] In this manner, the MC-Key is made into highly confidential information that is not
recognizable at the user level and further is not transmitted/received between the
client terminal device
1 and the system server device
4.
[0088] By making it unnecessary to transmit/receive the MC-Key between the client terminal
device
1 and the system server device, problems such as third-party interception of the MC-Key
can be prevented.
[0089] In case of returning the user ID, the system server device
4 selects the MC-Key which corresponds to the currently-accessed user's memory card
16 from the MC-Keys pre-stored in the database
3. The User ID is then encrypted using this selected MC-Key and returned to the client
terminal device
1.
[0090] This MC-Key is then used for decrypting the above-mentioned User ID, Media Unique
ID (MID), Content-Key, and Content-Gen-Key respectively.
[0091] The MID is an ID uniquely attached to each individual optical disk. The Content-Key
is an encryption key used for subjecting content stored in an optical disk to encryption
processing. The Content-Gen-Key is an encryption key used for employing re-encryption
processing on content to be copied to the HDD
2.
[0092] Using the Content-Key mentioned above, the client terminal device
1 decrypts content reproduced from an optical disk. Then using the Content-Gen-Key
mentioned above, the client terminal device
1 subjects the decrypted content to re-encryption processing and copies it to the HDD
2. This will be described in more detail later.
[0093] Next, the user registration procedure proceeds to Step S6, wherein the client terminal
device
1 stores the User ID returned from the system server device
4 side into the memory card
16. Through this, the user all the registration procedure shown by the flowchart in
FIG. 5 is completed. At this point, the User ID encrypted with the MC-Key, together
with the MC-ID and the MC-Key pre-stored as shown in FIG. 6, are all stored in the
memory card
16.
Registration of Media Unique ID and Acquisition of Content
[0094] Next, if it is possible to copy the content stored in the optical disk to the HDD
2 many times, then by merely lending the memory card
16 stored with the MC-ID, MC-Key and User ID to another user, this other user would
also become able to copy in an unauthorized manner the content stored in the optical
disk onto his/her HDD, which is undesirable.
[0095] In the case of this copy management system, when content is to be copied to the HDD
2, the user transmits the Media Unique ID (MID) uniquely attached to each individual
optical disk to the system server device
4 side via the client terminal device
1. Together with registering the MID transmitted by the user, the system server device
4 transmits the Content-Key for decrypting the encrypted contents to the user. The
client terminal device
1 decrypts the content stored in the optical disk using the Content-Key and copies
it to HDD
2. Accordingly, the fact that this Content-Key has been received means that the content
copy has been licensed for the client terminal device
1 by the system server device
4.
[0096] Upon confirmation that the Content-Key has not been previously sent for the MID received
from the client terminal device
1, the system server device
4 transmits the Content-Key. Through this, the transmission of a Content-Key to the
same MID can be limited to one time only.
[0097] Assume, for example, the case where a certain user, after copying contents stored
in an optical disk purchased by this user himself/herself to his/her HDD
2, lends this optical disk to another user. The other user, when trying to copy the
content to the HDD
2, transmits the MID of the borrowed optical disk to the system server device
4. However, on the system server device
4 side, there is history remaining which shows that the Content-Key for the MID of
that optical disk has been already transmitted. In this case, the system server device
4 does not distribute a Content-Key to other users. The other users who are unable
to acquire the Content-Key, is then not able to copy the content to the HDD
2. In such a manner, this copy management system prevents unauthorized content copy.
[0098] In the flowchart of FIG. 7, the flow from Media Unique ID (MID) registration to acquisition
of the Content-Key by a user is shown. In addition, each piece of information transmitted/received
between the client terminal device
1 and the system server device
4 during the MID registration and the Content-Key acquisition is shown in FIG. 8.
[0099] Using FIG. 7 and FIG. 8, the procedure for MID registration and Content-Key acquisition
is described forthwith. The procedure for MID registration and Content-Key acquisition
(registration/acquisition procedure) shown in FIG. 7 is executed on the premise that
the user has duly finished user registration as described earlier.
[0100] To begin with, in Step S11, the client terminal device
1 establishes a communication link with the system server device
4. Afterward, the registration/acquisition procedure proceeds to Step S12.
[0101] It is noted that in this example it is described that, after the user registration
described earlier has finished, the communication link established between the client
terminal device
1 and the system server device
4 is temporarily terminated, then during the execution of this registration/acquisition
procedure, the communication link is once again established between the client terminal
device
1 and the system server device
4.
[0102] Alternatively, it is also possible to execute this registration/acquisition procedure
in continuation with the user registration described above without terminating the
communication link established between the client terminal device
1 and the system server device
4. In this case, this registration/acquisition procedure skips Step S11 and proceeds
to Step S12 from START.
[0103] Next in Step S12, the client terminal device
1 transmits the User ID and MC-ID acquired in the manner described earlier to the system
server device
4. In addition, the client terminal device
1 transmits to the system server device
4 side the MID uniquely attached to the optical disk stored with the contents that
are to be copied forthwith to the HDD
2, together with this User ID and MC-ID.
[0104] More specifically, the CPU
30 communicates with the memory card
16 and transmits the MC-ID to the system server device
4 side in the manner shown in FIG. 8. In addition, the CPU
30 reads out from the memory card
16 the User ID encrypted with the MC-Key in the manner described earlier and transmits
it to the system server device
4 side. In addition, the CPU
30 encrypts the MID reproduced from the optical disk by controlling the optical disk
controller
33 and transmits this to the system server device
4 side.
[0105] It is noted that the Client ID and HDD-ID may also be sent together with each of
these pieces of information to the system server device
4 side. The Client ID and HDD-ID can be used together with the above-mentioned MC-ID
to identify the user. By identifying the user using these three Ids that are the MC-ID,
Client ID and HDD-ID, a more accurate identification of the user can be performed
than when only the MC-ID is used to perform user identification.
[0106] Information to be transmitted/received between the client terminal device
1 and the system server device
4 is encrypted and transmitted/received based on a transmission protocol such as Secure
Sockets Layer (SSL). Through this, communications having a high level of security
can be performed between the client terminal device
1 and the system server device
4.
[0107] Next, in Step S13, the system server device
4 determines whether or not the User ID transmitted from the client terminal device
1 side is a valid ID. In this Step S13, if the system server device
4 determines that the User ID is valid, this registration/acquisition procedure proceeds
to Step S14. Otherwise, if in this Step S13 the system server device
4 determines that the User ID is invalid, this registration/acquisition procedure proceeds
to Step S17.
[0108] More specifically, the system server device
4 refers to the database
3 based on the MC-ID (and Client ID and HDD-ID) received from the client terminal device
1 side and reads out the MC-Key corresponding to this MC-ID. Based on this MC-Key,
the system server device
4 respectively decrypts User ID and MID that is encrypted with the MC-Key and sent.
[0109] As described earlier, the database
3 on the system server device
4 side is stored with, for example, the User ID, MC-ID, Client ID, and HDD-ID as user
entry information. As a result, the system server device
4 retrieves user information within the database
3 based on the MC-ID (and Client ID and HDD-ID). The system server device
4 then collates the User ID within this user information with the User ID of the user
currently accessing the system server device
4 side.
[0110] In the case where both of these match, the system server device
4 determines that the user currently accessing the system server device
4 side is an authorized user. With this, the registration/acquisition procedure proceeds
to Step S14.
[0111] On the other hand, when the User ID within this user information in the database
3 does not match the User ID of the user currently accessing the system server device
4 side, the system server device
4 determines that User ID to be invalid. Then, in Step S7, the system server device
4 responds by transmitting a message prompting user registration to be performed again
such as "USER ID INVALID. PLEASE COMPLETE USER REGISTRATION." (notice of invalidity)
to the client terminal device
1 side. With this, the registration/acquisition procedure is terminated without completion.
[0112] Next, in Step S14, the system server device
4 determines whether the content stored in the optical disk of the user currently accessing
it has a history of being copied in the past.
[0113] More specifically, in the case of this copy management system, all of the MIDs respectively
attached to the optical disks are stored in database
3. Once the content has been copied, the system server device
4 flags the MID in database
3 to leave the copy history behind.
[0114] Therefore, after decrypting the MID, the system server device
4 detects whether MID has been flagged. With this, it is possible to determine whether
the content has been copied in the past from the optical disk having that unique MID.
[0115] If that MID has not been flagged, it means that content has not been copied in the
past from the optical disk to which that MID is attached. Therefore, the system server
device
4 flags the MID in database
3. In addition, the system server device
4 registers this flagged MID in the user entry information for that user, and the registration/acquisition
procedure proceeds to Step S15.
[0116] On the other hand, if that MID has been flagged, it means that contents have been
copied in the past from the optical disk to which that MID is attached. Accordingly,
in Step S17, the system server device
4 responds by transmitting a message rejecting the user registration such as "CONTENT
CANNOT BE COPIED FROM THIS MEDIA" (notice of invalidity) to the client terminal device
1 side. With this, the registration/acquisition procedure is terminated without completion.
[0117] If content has not been copied in the past from that user's optical disk, then it
proceeds next to Step S15. In this case, using the MC-Key of that user's memory card
16, the system server device
4 encrypts the Content-key that encrypted the content stored in the optical disk. This
encrypted Content-Key is then transmitted to the client terminal device
1 side. The fact that this Content-Key has been transmitted means that the copy of
the content stored in the optical disk has been licensed for the user from the system
server device
4 side.
[0118] The MC-Key is uniquely attached to the memory card
16 that user has in his/her possession. Therefore, the user who is able to decrypt and
use this Content-Key is only the user which has the memory card
16 stored with that MC-Key. Accordingly, the above-mentioned Content-Key can only be
safely transmitted for an authorized user.
[0119] In addition, the system server device
4 reads out the Client ID of the client terminal device
1 utilized by the user and the HDD-ID of the HDD
2 based on the user entry information stored in the database
3. The system server device
4 encrypts each of these IDs using a "Content-Gen-Key" formed with, for example, random
numbers and returns them to the client terminal device
1 side.
[0120] Moreover, the system server device
4 encrypts this Content-Gen-Key, which is used when encrypting the Client ID and the
HDD-ID, with the MC-Key described above and returns it to the client terminal device
1 side.
[0121] As is described later in more detail, the client terminal device
1 collates the Client ID of said client terminal device
1 with the Client ID returned from the system server device
4. In addition, the client terminal device
1 collates the HDD-ID of the HDD
2, which is connected to said client terminal device
1, with the HDD-ID returned from the system server device
4. Then the client terminal device
1 verifies that the above-mentioned two Client IDs and the above-mentioned two HDD-IDs
respectively mach and begins to copy the content.
[0122] Therefore, by returning a pre-registered Client ID and HDD-ID to the client terminal
device
1 from the system server device
4, content copy can be made possible only with the combination of the user's client
terminal device
1 and the HDD
2 that have already been registered in the database
3.
[0123] Moreover, the system server device
4 encrypts the Content-Gen-Key, which encrypted the Client ID and the HDD-ID, using
the MC-Key uniquely attached to the memory card
16 held by the user and returns it to the user's client terminal device
1. Therefore, the user who is able to decrypt and use this Content-Gen-Key is only
the user having the memory card
16 stored with that MC-Key. Accordingly, the above-mentioned Content-Gen-Key can be
safely transmitted only for an authorized user.
[0124] Next in Step S16, the client terminal device
1 respectively stores the Content-Key encrypted by the MC-Key returned from the system
server device
4 side, the Content-Gen Key encrypted by the MC-Key, and the Client ID and HDD-ID encrypted
by the Content-Gen-Key in memory card
16. With this, the registration/acquisition procedure shown in the flowchart of FIG.
7 is completed.
[0125] In this manner, this copy management system permits copy of content stored in an
optical disk having an MID with no past history of being copied. Through this, copy
of content stored in each optical disk is limited to one time only. Therefore a third
party who has borrowed the optical disk stored with contents that have already been
copied cannot copy content from that borrowed optical disk. Accordingly, unauthorized
copying of content by many users from one optical disk can be prevented.
Content Copying
[0126] Next, the user is allowed to copy the content stored in the optical disk to the HDD
2 by acquiring this Content-Key.
[0127] FIG. 9 is a flowchart showing the flow of this copying procedure and FIG. 10 is a
diagram schematically illustrating information handled among the client terminal device
1, the HDD
2 and the memory card
16 when this content is copied. A copying procedure is described forthwith using this
FIG. 9 and FIG. 10.
[0128] To begin with, the flowchart in FIG. 9, starts at the point where MID registration
described earlier is completed, and a user who has acquired a Content-Key designates
content copying by manipulating the client terminal device
1.
[0129] In Step S21, the IOP
32 of the client terminal device
1 reads out from the memory card
16 the Content-Key and Content-Gen-Key, which are respectively encrypted with the MC-Key,
and supplies them to the CPU
30.
[0130] As described earlier, the MC-Key is respectively retained in system server device
4 and the client terminal device
1. Therefore, the CPU
30 subjects the above-mentioned encrypted Content-Key and Content-Gen-Key to decryption
processing using this retained MC-Key. The CPU
30 then stores the decrypted Content-Key and Content-Gen-Key in RAM
36. With this, the copy procedure proceeds to Step S22.
[0131] In Step S22, the IOP
32 reads out the Client ID and HDD-ID, which are respectively encrypted with the Content-Gen-Key,
and supplies them to the CPU
30. The CPU
30 decrypts the Client ID and HDD-ID using the earlier decrypted Content-Gen-Key.
[0132] In addition, in this Step S22, the CPU
30 collates the above-mentioned decrypted Client ID with the Client ID attached to the
client terminal device
1. In addition, the CPU
30 collates the above-mentioned decrypted HDD-ID with the HDD-ID of HDD
2 connected to the client terminal device
1.
[0133] Next, in Step S23, the CPU
30 determines whether or not each of the above-mentioned Client IDs and the each of
the above-mentioned HDD-IDs respectively match. If both match, then the copy procedure
proceeds to Step S24 to execute the copying of content. If both do not match, the
copy procedure proceeds to Step S28.
[0134] If the client ID and HDD-ID decrypted from the memory card
16 do not match the Client ID and HDD-ID of the client terminal device
1, it means that the Content ID acquisition described earlier has not performed based
on the client terminal device
1 and the HDD
2 of the authorized user.
[0135] More specifically, in this case, it shows that an unauthorized user who borrowed
the memory card
16 from the authorized user, is trying to copy content.
[0136] Accordingly, the CPU
30 displays a content copy rejection message such as "COPY IS NOT PERMITTED" to the
user. With this, the copy procedure is terminated without completion.
[0137] Next, Step S24 is the step executed if the client terminal device
1 has detected a match between each of the above-mentioned client IDs and each of the
above-mentioned HDD-IDs, respectively. In this case, using the Content-Key stored
in the RAM
36, the CPU
30 decrypts the content reproduced from the optical disk by the optical disk controller
33. In addition, using the Content-Gen-Key stored in the RAM
36, the CPU
30 subjects the decrypted content to re-encryption processing and supplies it to the
HDD
2.
[0138] Next, in Step S25, the HDD
2 saves (copies) the content re-encrypted using the above mentioned Content-Gen-Key
as shown in FIG. 10.
[0139] Next, in Step S26, the CPU
30 of the client terminal device
1 communicates with the HDD
2 to determine whether or not copying of the content has been completed. If copying
has not been completed, the CPU
30 repeatedly executes the operations in Step S24 and Step 25 described earlier to supply
content to the HDD
2 until copying of the content has been completed. Once the copying of content has
been completed, the copy procedure proceeds to Step S27.
[0140] In Step S27, since the copying of content has been completed, the IOP
32 deletes the Content-Key stored in the memory card
16. With this, the copy procedure ends.
[0141] In this manner, the client terminal device
1 decrypts with a Content-Key issued from the system server device
4 the content stored in the optical disk that has been encrypted with a Content Key,
and copies it to the HDD
2. Then after this content has been copied, the Content-Key stored within the memory
card
16 (the Content-Key issued from the system server device
4) is deleted.
[0142] As described earlier, since a copy history remains in the database
3 for the optical disk from which content has already been copied, in principle, the
system server device
4 will not re-issue a Content-Key. Therefore a copy request from a third party who
has borrowed an optical disk stored with content that has been copied once will be
rejected by the system server device
4 based on the copy history remaining in the above-mentioned database. Also, the system
server device
4 will not transmit the Content-Key to this third party.
[0143] Since the above-mentioned third party is not able to acquire the Content-Key, he/she
will not be able to decrypt the content stored on the borrowed disk. Accordingly,
even if the above-mentioned third party is able to copy the content onto a secondary
storage media such as a HDD, such content cannot be used since he/she is not able
to decrypt such. content. Accordingly, this copy management system is able to prevent
unauthorized use of content.
Reproduction of Copied Content
[0144] Next, the content copied in this manner to HDD
2 can be repeatedly reproduced and used by the user.
[0145] FIG. 11 shows a flowchart illustrating the flow of a reproducing procedure for content
stored on the HDD
2. In addition, FIG. 12 shows a schematic diagram of information handled among the
client terminal device
1, HDD
2, and the memory card 16 during this reproducing procedure.
[0146] The flowchart in FIG. 11 starts at the point where a user who has duly completed
copying of content as described earlier specifies reproduction of content.
[0147] In Step S31, the IOP
32 of the client terminal device
1 reads out the Content-Gen-Key, which is encrypted with the MC-Key described above,
from the memory card
16 and supplies it to the CPU
30. The CPU
30 then decrypts and reproduces this Content-Gen-Key using the MC-Key saved on the client
terminal device
1 side.
[0148] In Step S32, the IOP
32 reads out the Client ID and HDD-ID, which are encrypted with the Content-Gen-Key,
from the memory card
16 and supplies them to the CPU
30. The CPU
30 decrypts the Client ID and HDD-ID using the earlier decrypted Content-Gen-Key.
[0149] Next, in this Step S33, the CPU
30 collates the Client ID decrypted with the above-mentioned Content-Gen-Key, with the
Client ID attached to the client terminal device
1. In addition, the CPU
30 collates the HDD-ID decrypted with above-mentioned Content-Gen-Key, with the HDD-ID
of the HDD
2 connected to the client terminal device
1.
[0150] If each of the above-mentioned Client IDs and each of the above-mentioned HDD-IDs
do not respectively match, it means that another user's memory card
16, another user's client terminal device
1, or another user's HDD
2 is being used. Accordingly, in Step S35, the CPU
30 displays a content reproducing rejection message such as "CONTENT REPRODUCTION IS
NOT PERMITTED" to the user. With this, the reproducing procedure is terminated without
completion.
[0151] In this manner, with this copy management system, even when content copied to the
HDD
2 is reproduced, the Client ID and HDD-ID are verified. For example, consider the case
where a third party borrows the memory card
16 and the HDD
2 which an authorized user owns and in which content is saved. The third party connects
the borrowed memory card
16 and HDD
2 to his/her own client terminal device and tries to playback contents stored within
that HDD
2.
[0152] However, the Client ID stored within memory card
16 is the Client ID is that of the authorized user. As a result, since the Client ID
of the third party client terminal device and the Client ID stored in memory card
16 do not match, reproduction of content stored in HDD
2 is rejected at the third party client terminal device. Accordingly, use of content
copied to HDD
2 can be prevented in the case where the memory card
16 and the HDD
2 are lent out.
[0153] Next, in the case where each of the above-mentioned Client IDs and each of the above-mentioned
HDD-IDs respectively match, the CPU
30 decrypts the content in HDD
2 using the Content-Gen-Key decrypted earlier, and stores this in RAM
36. With this, the reproducing procedure ends.
[0154] In the case where the content stored in the RAM
36 is, for example, game content of a video game, the CPU
30 operates in accordance with this game content. The CPU
30 then displays, for example, a character in the video game, and produces effective
sound or BGM etc. Thus, the user is able to enjoy the video game based on the game
content copied to the HDD
2 from the optical disk.
[0155] In the case where the video game is to be played by reproducing game content directly
from the optical disk, optical disk loading must be performed each time a new video
game is played. However, by copying the game content stored in the optical disk to
the HDD
2 in this manner, it is possible to save loading the optical disk, which was necessary
each time a user wanted to play a new video game. Thus it is possible to start up
a new video game smoothly.
[0156] It is noted that after the content has been copied from the optical disk, since the
Content-Key stored in the memory card
16 is deleted, the content cannot be copied again. However, the Content-Gen-Key stored
in the memory card
16 is not deleted after copying has finished. Accordingly, it is possible to repeatedly
play content encrypted with the Content-Gen-Key and copied to the HDD
2 by re-decrypting it using the Content-Gen-Key stored in memory card
16.
Accommodation for Device Repair/Exchange
[0157] With this copy management system, the system server device
4 controls, for example, the Client ID, HDD-ID, MC-ID (hereinafter referred to collectively
as the Device ID) and User ID collectively as user entry information. However, in
the case where a device such as the client terminal device
1 or the HDD
2 is exchanged due to damage, etc., the Device ID of this exchanged device is different
from the Device ID registered as the user entry information. Accordingly, if a device
is exchanged, although the user may be authorized, there is fear that copy or reproduction
of the content using that exchanged device will become impossible.
[0158] On the other hand, this copy management system aims to prevent unauthorized use of
content by maintaining the uniqueness of the Device ID. Therefore, even in the case
where the device such as the client terminal device
1 or the HDD
2 is repaired and restored to its original state, it is desirable that a new Device
ID, which differs from the Device ID attached before repair, is attached to the device
after repair, while reliably distinguishing between a pre-repair device and a post-repair
device.
[0159] However, if a Device ID is attached to a post-repair device in this manner, although
the user may be authorized, there is fear that copy or reproduction of the content
using that repaired device will become impossible, as in the case of exchanging devices
mentioned above.
[0160] This copy management system prevents in the following manner the above-mentioned
inconvenience that might appear by using a new Device ID due to device repair or exchange.
How to Cope with the Repair/Exchange of Client Terminal Devices and HDDs
[0161] FIG. 13 shows a schematic diagram for describing how to cope with the repair/exchange
of a client terminal device and a HDD in this copy management system. In FIG. 13,
the client terminal device
1 and the HDD
2 with the "X" drawn thereon are damaged devices.
[0162] In FIG. 13, when a device is damaged, the user sends the damaged device together
with the memory card
16 to a repair center on the administrator side, which manages this copy management
system.
[0163] Even though in this case the memory card
16 is not damaged, the Content-Gen-Key, and the Client ID and HDD ID encrypted with
the Content-Gen-Key are stored in the memory card
16. Therefore, even in the case where it is the device that is damaged, the memory card
16 should be sent (or brought) in the above-mentioned repair center together with the
damaged device.
[0164] At the repair center, once the malfunctioning device is sent in, this device is repaired/exchanged
so that it operates regularly and a new Device ID is attached to the repaired/exchanged
device.
[0165] More specifically, the Client ID of the client terminal device
1 is stored in MASK-ROM
35 with the above-mentioned Hardware ID and the operating system program. In addition,
a MASK-ROM similar to the above-mentioned MASK-ROM
35 is also provided within the HDD
2, and the HDD-ID is stored in this MASK-ROM. As a result, at the repair center, in
the case where the device is repaired, the MASK-ROM provided before the repair is
removed and by exchanging it with a MASK-ROM stored with a new client ID or HDD-ID,
a new client ID or HDD-ID is attached.
[0166] It is noted that in the case where the device itself is exchanged with a new device,
since a Device ID differing from that of the damaged device is stored in the MASK-ROM
of this new device, exchange of the MASK-ROM that is performed on repairing as described
above is not performed.
[0167] Next, an operator at the repair center reproduces the MC-ID of the memory card
16 sent in with the damaged device. The operator accesses the above-mentioned database
3 of the system server device
4 via a terminal device provided in the repair center, and based on the MC-ID reproduced
from the above-mentioned memory card
16, refers to the user entry information stored in the above-mentioned database
3. The operator then operates the terminal device to perform repair registration of
the newly attached Device ID into the Device ID of the user entry information stored
in database
3. In addition, the operator manipulates database
3 via the terminal device and remove the flags of the copied contents.
[0168] In addition, the operator operates the terminal device to delete the Content-Gen-Key
encrypted with the MC-Key, and the Device ID (Client ID and HDD-ID) encrypted with
the Content-Gen-Key, which are both stored within the memory card
16. This memory card
16 is then sent (handed) back to the user together with the repaired/exchanged device.
[0169] Thus, the state of the user's device (the client terminal device
1, the HDD
2 and the memory card
16) then is thereby returned to the state immediately after ending the user registration
procedure described using FIG. 5 and FIG. 6 (which is the same as the state immediately
before copying the content).
[0170] The user to whom the memory card
16 and the device are sent back then operates the client terminal device
1 so as to once again perform registration of the Media Unique ID (MID) and acquisition
of a Content-Key, which are described in FIG. 7 and FIG. 8.
[0171] The Client terminal device
1 accesses the system server
4 according to its operation by the user, and performs MID registration. The Client
terminal device
1 once-again copies to the HDD
2 the content stored in the optical disk using the content key obtained from the system
server device
4 through this registration.
[0172] With this, even in the case where a device is newly attached to a device due to repair/exchange
of the device, as long as the user is authorized, it is possible to execute copy or
reproduction of content based on the new Device ID.
[0173] In addition, on the copy management system side, by the attachment of a new Device
ID to a device restored to its original state through repair or exchange, a pre-repair
device and a post-repair device can be reliably distinguished.
How to Cope with Memory Card Damage/Loss
[0174] This copy management system handles damage or loss of the memory card
16 in the following manner. FIG. 14 shows a schematic diagram for how to cope with damage/loss
of the memory card
16 in this copy management system. In FIG. 14, the memory card
16 shown within the dashed-line frame is the damaged or lost memory card
16.
[0175] In the case where the memory card
16 has been damaged or lost, the user connects the client terminal device
1 to the system server device
4 via the Internet
5, and sends a request to reissue a memory card to the system server device
4, as shown in FIG. 14.
[0176] Once this request has been made, the system server device
4 sends User ID input screen data to the client terminal device
1 side. Through this, the user's client terminal device
1 displays the User ID input screen on the television receiver
18.
[0177] The user then inputs his/her User ID on this input screen. However, in this case,
since the memory card
16 is damaged or lost, the User ID cannot be read out from the memory card
16. Therefore, the user enters the User ID that, for example, he/she wrote down on a
memo pad when the User ID was issued and enters that User ID. The system server device
1 sends this input User ID to the client terminal device
4.
[0178] The system server device
4 refers to the user entry information in the database
3 that corresponds to the User ID transmitted from the user. Through this, the system
server device
4 can recognize the content copied using the Content-Gen-Key and the memory card
16, together with the MC-ID and MC-Key of the damaged/lost memory card
16.
[0179] Next, the system server device
4 reregisters the new MC-Key (New-MC-Key), the Content-Gen-Key newly encrypted with
this New-MC-Key, and the Client ID and HDD-ID encrypted with this Content-Gen-Key
for a memory card
16new having the new MC-ID. In addition, the system server device
4 performs rewriting of the MC-ID and MC-Key so that the user entry information stored
in database
3 becomes user entry information that corresponds to this new memory card
16new.
[0180] It is noted that in this case memory card
16 has been damaged or lost, but the user's client terminal device
1 and HDD
2 operate as normal. Therefore, the original device ID can be used as is for the Client
ID and HDD-ID encrypted by the Content-Gen-Key.
[0181] Next, the repair center physically sends this memory card
16new, for example by mail, to the user side. As described earlier, on the system server
device
4 side, not only is each piece of information within this memory card
16new overwritten, but the user entry information in database
3 is also overwritten. Accordingly, the user who receives the sent memory card
16new can perform copying of content and playback of the copied content as before using
the system comprising a combination of this memory card
16new, client terminal device
1, and HDD
2.
[0182] As it has been made clear from the above description, with the copy management system
of this first embodiment, a system administrator stores the content to which encryption
processing with a Content-Key has been employed, in an optical disk to which a Media
Unique ID (MID) has been attached and distributes the optical disk to a user.
[0183] The user transmits the MID of the optical disk to the system server device
4 when copying the content. In addition, the user transmits the Device ID (Client ID,
HDD-ID, MC-ID, etc.) of the device he/she is using to the system server device
4.
[0184] The System server device
4 stores the MID of the optical disk, which has had its content previously copied,
in database
3 in connection with the Device ID of the device used by each user. When a request
to copy content is made by the user, the system server device
4 refers to the database
3 based on the Device ID of the device used by each user and the MID of the optical
disk. Provided the same MID has not been registered within the database
3, the system server device
4 transmits to the user's client terminal device
1 the Content-Key for decrypting the content.
[0185] The client terminal device
1 decrypts the content stored in the optical disk using this Content-Key and copies
it to the HDD
2.
[0186] In the case where this copy management system notices an MID that is the same as
the MID registered within database
3 and a copy request has been made, the above-mentioned Content-Key is not distributed.
Therefore, this copy management system can limit content copying to one time only
and can prevent unauthorized content copying.
Second Embodiment
[0187] Next, a copy management system of the second embodiment of the present invention
is described forthwith. The copy management system of the first embodiment described
above performs user registration by having the user connect his/her own client terminal
device
1 directly to the system server device
4 on the system administrator side, and perform content copying by acquiring, for example,
a Content-Key.
[0188] With the copy management system of this second embodiment, however, a third party
management server device
3, which a third party manages, is provided between the user's client terminal device
1 and the system server device
4 on the system administrator side. The user acquires a Content-Key or the like via
this third party management server device. The third party management server device
then charges for the provision of this Content-Key or the like.
Configuration of Second Embodiment
[0189] FIG. 15 shows the system block diagram of the copy management system according to
the second embodiment of the present invention. FIG. 15 shows the flow of acquiring
a Content-Key when copying content from an optical disk.
[0190] In FIG. 15, the system server device
4 and a third party management server device
50 are connected to each other via, for example, a dedicated line or a Virtual Private
Network (VPN) that allows a public telephone line to be used as a dedicated line.
[0191] In addition, though the system server device
4 is not connected to the Internet
5, this third party management server device
50 is connected to the Internet
5. Accordingly, since the user cannot access to the system server device
4 directly, the user needs to accesses to the system server device
4 via this third party management server device
50.
Operation of Second Embodiment
[0192] Next, the operation according to the copy management system of the second embodiment
of the present invention is described forthwith. In the case of the copy management
system of this second embodiment, a user attempting to copy content from an optical
disk connects his/her own client terminal device
1 to the third party management server device
50 via the Internet
5. The user then transmits an MC-ID, User ID and Media Unique ID (MID) to the third
party management server device
50 side via the client terminal device
1. In addition, the user transmits account information (for example User Name and Password)
for the third party management server device
50 to the third party management server device
50 via the client terminal device
1.
[0193] The client terminal device
1 sends this MC-ID and the account information as is to the third party management
server device
50. In addition, the client terminal device
1 encrypts User ID and the MID of the optical disk using MC-Key and sends them to the
third party management server device
50.
[0194] The third party management server device
50 extracts the account information from each piece of information transmitted from
the client terminal device
1. In addition, the third party management server device
50 transmits the MC-ID, the User ID encrypted with the MC-Key, and the MID encrypted
with the MC-Key to the system server device
4 via a dedicated line (or the above-mentioned VPN).
[0195] Once the system server device
4 receives this MC-ID, User ID, and MID, it encrypts a Content-Key, which is for decrypting
content encrypted in a similar manner as that described earlier and stored in the
optical disk, using the MC-Key and returns it to the third party management server
device
50. In addition, the system server device
4 encrypts a Content-Gen-Key with the MC-Key and returns it to the third party management
server device
50. The system server device
4 further encrypts the user's Client ID and HDD-ID with the Content-Gen-Key and returns
them to the third party management server device
50.
[0196] The third party management server device
50 respectively transfers the Content-Key encrypted with the MC-Key, the Content-Gen-Key
encrypted with the MC-Key, and the user's Client-ID and HDD-ID encrypted by the Content-Gen-Key
to the user's client terminal device
1 via the Internet
5.
[0197] The third party management server device
50 charges the user a fee for providing the Content-Key based on the account information
for the third party management server device
50 transmitted earlier from the client terminal device
1.
[0198] The client terminal device
1 stores the Content-Key, Content-Gen-Key, Client ID and HDD-ID transmitted from the
third party management server device
50 in the memory card
16 and uses them, as described earlier, for copying content and reproducing copied content.
[0199] On the third party management server device
50 side, for example, the user's credit card number or information about a prepaid amount
has been pre-registered. Accordingly, the third party management server device
50 bills and collects from the credit card company the amount charged for the provision
and delivery of the Content-Key. Otherwise, the third party management server device
50 deducts the amount of the charge from the prepaid balance.
[0200] The money collected in this manner is distributed based on predetermined percentages
between, for example, the system server device
4 administrator and the third party management server device
50 administrator.
[0201] In this manner, the copy management system of this second embodiment provides a third
party management server device
50 between the client terminal device
1 and the system server device
4. The user requests distribution of a Content-Key by accessing the system server device
4 via this third party management server device
50. The third party management server device
50 distributes this Content-Key and charges the user for it.
[0202] As a result, besides being able to provide a novel copy management system which is
a copy management system in which a third party (the third party management server
device
50 administrator) intervenes, this copy management system can obtain the same results
as the copy management system of the previously described first embodiment.
[0203] In addition, with this copy management system, by charging for the content when distributing
the Content-Key to the user, content can be distributed to users free of charge via
an optical disk or a predetermined network.
[0204] It is noted that in this copy management system, it is also possible for an optical
disk to be distributed to a user without an MID being attached, and then when the
user requests to copy it, the system server device
4 or the third party management server device
50 can distributes the Content-Key to the user and charge for it.
[0205] In addition, with the copy management system of this second embodiment, the third
party management server device
50 is set up to carry out the charging; however, it is also possible for the system
server device
4 to carry out the charging.
[0206] Finally, the present invention is not meant to be limited in any way by the embodiments
described above by way of example. Accordingly, it is also appended herein that even
if there are additional embodiments besides those mentioned above, various modifications
thereto according to design and such can be naturally made without deviating from
the technical spirit and scope of the present invention.
[0207] For example, in the above-mentioned embodiments, the client terminal device
1 transmits to the system server device
4 the client ID, HDD-ID, and MC-ID as device identification information. However, only
the client ID can be transmitted from the client terminal device
1 to the system server device
4. In the same manner, only the HDD-ID can be transmitted from the client terminal
device
1 to the system server device
4. Likewise, only the MC-ID can be transmitted from the client terminal device
1 to the system server device
4.
[0208] Further, the client ID together with the HDD-ID can be transmitted from the client
terminal device
1 to the system server device
4. In the same manner, the client ID together with the MC-ID can be transmitted from
the client terminal device
1 to the system server device
4. Likewise, the HDD-ID together with the MC-ID can be transmitted from the client
terminal device
1 to the system server device
4.
[0209] Namely, the above-mentioned copy management system of the each embodiment prevents
unauthorized copy of the content by managing the storage media stored with the content
to be copied in a state of being associated with the device used for copying the content.
Therefore, the device identification information that is transmitted from the client
terminal device
1 to the system server device
4 should be at least the information that can specify users.
[0210] Though the memory card
16 is used in the above-mentioned embodiments, it is not always necessary with the copy
management system. In the case the memory card
16 is not used, the Content-Key and Content-Gen-Key stored in the memory card
16 can be stored in the internal memory of the HDD
2 or the client terminal device
1.
INDUSTRIAL APLICABILITY
[0211] The present invention can be applied to a copy management system that performs copy
management of a computer program.